0% found this document useful (0 votes)
54 views1 page

On The Significance of Cryptography As A Service: Shylesh S, Chaitra, Mangesh Nayak

This article surveys literature on social engineering attacks and their impact on organizations and individuals. It describes how social engineering combines with other attacks like phishing and watering hole attacks to gain sensitive information for identity theft and password stealing. The research aims to investigate the effects of modern social engineering and how attackers take advantage of human behavior. It also discusses direct and indirect social engineering attacks and potential defense mechanisms.

Uploaded by

shylesh86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views1 page

On The Significance of Cryptography As A Service: Shylesh S, Chaitra, Mangesh Nayak

This article surveys literature on social engineering attacks and their impact on organizations and individuals. It describes how social engineering combines with other attacks like phishing and watering hole attacks to gain sensitive information for identity theft and password stealing. The research aims to investigate the effects of modern social engineering and how attackers take advantage of human behavior. It also discusses direct and indirect social engineering attacks and potential defense mechanisms.

Uploaded by

shylesh86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

On the Significance of Cryptography as a Service

Shylesh S, Chaitra, Mangesh Nayak


College of Computer and Information Sciences, Mangalore, India
E-Mail: shylesh.s@live.com

ABSTRACT
This article surveys the literature on social engineering. There are lots of security application and
hardware in market; still there are several methods that can be used to breach the information
security defenses of an organization or individual. Social engineering attacks are interested in
gaining information that may be used to carry out actions such as identity theft, stealing
password or gaining information for another type of attack. The threat lies with the combinations
of social engineering with another type of attacks like Phishing and Watering hole attack which
make it hard to defense against. This research aims to investigate the impact of modern Social
Engineering on the organization or individual. It describes the categories of Social Engineering,
and how the attacker takes advantage of human behavior. At the same time, we also discuss the
direct and indirect attack of social engineering and the defense mechanism against this attack.
Keywords: Cryptography, Software as a Service, Cryptography as a Service, Mobile, Cloud
Computing.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy